Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
8adcefdc7be774761c9ccf8b13b21085_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8adcefdc7be774761c9ccf8b13b21085_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8adcefdc7be774761c9ccf8b13b21085_JaffaCakes118.html
-
Size
332B
-
MD5
8adcefdc7be774761c9ccf8b13b21085
-
SHA1
b6dd54d79db8dcf3b9f529f2ba9076fce928328f
-
SHA256
fad03cafab4ed0e056f135655ff42efbf72768a7da6352c042e4803e20a4dc97
-
SHA512
c652d392550029416ba428a877d466d0b8980489801a7a5c4ad1cb5108e456580649c5715754ccf257603f06dedfef071d8a318529bafbdd30d67572d99ea0d5
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007ccfa369e9c23a8761b8d19cc29c983151b18ea22e1c4d7033fd0075633e9cbc000000000e800000000200002000000064bae717c90ae34f1408ee428c381d201cf55088827366040cd0b2af7db37aca2000000030e8c004ab2674c565326c35c539c880031aa47eeedfbece29f375a4b9e5bcb240000000bf82c5ef76774e5feff4f7f861fd5de17730d1f608bfc7a552e2884f377a00a4d6afaff157fac6179442b7a977188f1de1facf9a48bba86d0e022dbecd8f1d88 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{233A0171-202A-11EF-BE4D-CE57F181EBEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f7baf736b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423416949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2092 2108 iexplore.exe 28 PID 2108 wrote to memory of 2092 2108 iexplore.exe 28 PID 2108 wrote to memory of 2092 2108 iexplore.exe 28 PID 2108 wrote to memory of 2092 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8adcefdc7be774761c9ccf8b13b21085_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82eca92fea6f71f210927ea5977233a
SHA160dbcb0ba081902d4a07b6b343fae081ae08033b
SHA25636f50f0ec192a39812c02ddab82c983013ba41dadd320d5fb710a97a82fee472
SHA51239f613d6872e9a4fb064f73d34bff0375eb9e5cd2a04f2d7276dd917422c2a3603f636f474d3e4d921b8fe39c8754c78bcae5da83afe706d3e50099895a0f199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1141ed7037acd2cdf2ee65cb291716
SHA14ceb337b025d0a5894fd0cce8ddc4d1d457589af
SHA2560a1065189dbf12d30b824b106448b7c4841befeb31071f0c6459a20ea210cc41
SHA512f69f74bec7b3cca81a90a1c172ce36d2eb65a5a64b95b679c50da933770e683761225290e142d067750a345c7a32a0596cc90331e0b6f7c5ba3e7d485dd410a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ae4e9524927e73a17f36161dcd8b1f
SHA15ea60006bd94eb6ba75574665e29d54fa26103aa
SHA2566e352bc3bf44ce045dcf0ea19b48e6b012c1d52cef229d9ce94a0842c7fd6c2a
SHA51225f0e48999daa4a2dc610b8ac520dbef07eb6f0a7054107ff7405832923091dae60042f602a2dc3bd225134baf58f3affedb966568f15a50fcb81a44c85fede4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31a4d609960c2ebb30e97825ee93a84
SHA1f870a716963627a9943f2bbb83e124380ae49fac
SHA2565af1f9b196a970092f9f787c2ccfb7a21fe493ce42aadb7684afd41907d398f7
SHA51287a85022c65b8865bf887fe7d6393eda9700ca11a051c952cc22fcf1930932ffbdb370d845d54ff33b52aaa5529f0585849540d6b24e71ba95cfcfbcd25ea9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36f8fa2d7696864d6bf1a9025eb523c
SHA18518554e746f4e5f96ecba1d7d46dcb5545f695e
SHA256ee010c9d37937a66edfbaf424838ebcd710251be87e487b5c072cd8280ff4d03
SHA51224ad73ce2441895108dd9adf388e57b241ad22f42184b514408a666422d5b7c8b3146bfa8bad755897aac57986513bb0a2d9b76b59481a2974c2088d71100773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b739150562ba236305659a14c90ee2f
SHA1a90ece5530251e6d67061fa04c68a930c021b1b0
SHA256b743f695a9d6faf83e9bffddc98a6989111810c90d559c1d2f1a60b80f96caf0
SHA512d0baa0ae0958c8829402d5de938c6f60bfc8db766a6d682e5439c1d0dd9daad5c5cbb8f0de0d98dd4ea5d3113c7e0f258349326a3d886cb1a7fd530ea73b2e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ac002f568c94bdc0615fac2ec4b9f3
SHA1743928b62ebad7c0b7d72179020a91538773745a
SHA2562aea60ec268e08cd3e3e7c50559d8d351ca2c6ec621bee57d51af87423108fb6
SHA5121e55cb4924be73d00086ce017e2dfdfefc87393b5c90bf121e9a8663566cfa8d87abdf91bdb81b189bcae63b734d9bb00551ddbf26bf4488d292e8b3ae7686c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd6d38c9fc987e18c95441a299ac2b5
SHA161872df10a5851ffb3d095b27e27ece1d4772dc3
SHA256218f2d0e6d6d8830fee9e5fbb51734fb2ae6522481210b8dab25a2a42c63fb7e
SHA512105e092193fbeedceceb3dfb22de30b275b2e0d2b187cd384798c8f31c936758d9f7b3ff0cd97e452fd15147a8e78f6096c510f6977feec58f8547ea529f698b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944bc93cddf75c3cf10a367c8c1d488e
SHA1963e18637d66aad9a903f6b6077aad5e7e0dca76
SHA2567a9b730541b1b6910d7f85737aa878806f97284a152b55d2bd36e0cc952bb5d1
SHA512f397c88f3fae70427607cc3020e988c4f46bd778d9545d394056a7d76bbc8bdebb7a3f99bb604cc2075a453f34abc08062c92b638cd3336c857e7b249d05449d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566839a044a2bab95aa794f561ad2031e
SHA19ec8ce9b77959424907985fd14ad80d8b977a536
SHA256d62772e54d1fb8dfa33f17e0a9c281c04d108ce6a17dd1c172456d58c7567df1
SHA512ff48a071cbe1d555660cd71916f950e5abdae1f25831676ea088dc40fa34e0ad1651a30b02847423e47379c520e4507afd9323d08318c3dc1da92593be69e691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e369420267ec1e774865b982d222572f
SHA1e329af9b16d2b961f545d3d3743bf0e21d7b17d9
SHA2563534ace722e1a3cded8b2e043cff308a4319fddcd6483008599c10b4d48c2d53
SHA51240a279214e711628d114b3111266056e06cf55d5511786b2cfdf2ce6b5240526e9e6ab309046eb35aea8b892f924a98f18ff0180202b6cea89c3447eb91144a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580cc1f0595aa7166f4eeb15cbe5675c9
SHA1ab03a252034ae28acd47e1a642c8c6a70751fcd0
SHA256f0b6565b19f80be65b7538dc14ba05db3506ff8137ace98b3dc2218733c0e0e4
SHA512d4a2524870f3dcdc74637df7752c575dfe8ae0b6c289be7b785b69f5fa626d8958f7a6ced62265b822528a335dea483d9b3e7704da59a883a5e7814d7b3daede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43278ce918f48db83a213ebf6092973
SHA1f5accedf65e348f5c9d866b5e05ff8804841e7e0
SHA256664f6d988d7a2509e1bdca9a56b43e7a750b0ef96bde63d8b3c16f2b27630b1e
SHA51279cd42679549e419285708b35cb5e7fb54fef758441a995d3ea23089e7382c6aefcf217547ce42c3af07d89d6afd7199e02610ae1aaca13027081d48888deadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08b7e87dcfdb8d90e8dca594bf857be
SHA15554e1bdad35ee022eb90495673f3adc386c7550
SHA25667531659eb78d6ea5946c22e8c4d5c5ef7206dc482889e96645a16cc4a529e80
SHA512cc713c89f63a966b608df52a80c7df8cc895ba16af85fb114486e46fb1e29e15d91b8a16e0af6d07fa83593518e3ebb13ae6356e91ba12dbf4edaba7b3423fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55364181cf60f03db9f23bdfc57a60315
SHA1cb829f8c3d47b12289100859c18a78c33a864ea3
SHA2568dc1ef41cde38ea52226650686fefaeea16e3c3b52ef9e29213a5f6349ed96ab
SHA51272d64c23bde0d51b1e1d5bca13552efafa8415c7c1613ce5ff4e50d92f5370e2f79366a3e9029c8f966e17fe47180a720754b4daf0d7258960e5e6e523b689f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb71508bca775b10e45ac4b163ad211c
SHA19d858bfd0de78edf7468bcf8f27e76f088011500
SHA256d6421ec041cdaede89bcabceefc06cbf200a80514d10d40b195a5ceb160c7c23
SHA512a95c6cb74134b8c1571c57e8f4e134b67e2e688dd87b70bc351e61daf1b9fa2714af2c5493547742fa785be3926200b35cf85512c24a27aee5f11bc6ca908e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123374cc6fd0d3193ce0be8a255abfa0
SHA11e3d12c313dc2f13bc1eab03073cb58488931e34
SHA256f3bfe4c75b6de1ad38322f1cfda533d9721033243fdc5260c1d1ece9fdb723ed
SHA512ca21e1538281e775a50d53227f20793e0a3a7f9f6b6020c44d6adafbe836d72586a25a540029e8df15ba037473c17745a52f3b6dffd6adefc605709a295cdf3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4b77a78a69b06560f9b38a50870fc6
SHA14941ed9cedc72173964c67175512710d15beb325
SHA25634724c7b7825aa4fa1a33da9ad7a7b63cb94e6b2d6afee030133bf82ecb0e1eb
SHA51230242d466410adff71d8bb16528c287b35dc4b3e504607aff7cced6d21d8c3e9d998ccd2e53fc91724972cb53d847f28286924054272479371444baafa21c543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb88f1c88789f59089097a578bf35769
SHA1db9837a9c95fc255439a83a5da0d7258c02d35e1
SHA2568014a25aa105daaf4e3b6798e20f60f0c9ba66db805ebc1e769b5cc484758715
SHA512b277f421b558ecbc38c06b38c419e08d752a2b95cd357be429ada0a0648e41fefcf11082f6a96d17a539619f197cb5ffa8751ea04cdb4faed210edd74ffde878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ccf1ab9561ba99685bae50af191af55
SHA1de8963b3ad7777cf9ce6258a26066132b1ce883c
SHA256053714df092d0cfc8bdb2ba51dc6a76e522e2dbf147fd89e4490eee31641afd4
SHA5128e895969babf90312e93436b068c8d76a096ccf7e40dda84e3640318a93baa8150903d931d946717ace1e82a27c708701ce17f48e7bc7b91e0a84d92bf4dec49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d2359f9ee832937528fc3d753c21d9
SHA17ddcb22f3e6402b7bdd9d7b310eda4d7324de858
SHA256036996689f5e47104bcbb043113e425a5a8e4a56029a134e604350be6c8a6fe8
SHA512dec513fd610831f0f4d5c1fc5d08e26b25750f5fb9fa4cf0649837e8b7f053caea7bf427ad2e4cb28100e60e6d1cd082b8b34a4d21755b05275d65eaf529e88f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b